Cryptographic Hash Based Security Protocol For Mobile Rfid - A Review
Journal: International Journal of Scientific & Technology Research (Vol.3, No. 4)Publication Date: 2014-04-15
Authors : Yogini Mankar; Pranali Suryawanshi;
Page : 92-95
Keywords : Keywords RFID protocol; RFID tag; forward privacy; cryptographic hash function; security; IOT.;
Abstract
Abstract In the RFID systems privacy protection and integrity assurance become rather crucial because these RFID tags may have a wide range of transmission making them subject to unauthorized scanning by malicious readers and responsible for various other attacks. Da et alsRFID protocol overcome a forward privacy problem but assumed that communication channel between reader and database is secure which doesnt agree with the real development of IOT.Therefore to overcome the privacy weaknesses of RFID protocol in mobile environment an RFID security protocol based on the cryptographic hash function is design. The proposed work will increase security to certain extend as well as resistance to replay denial-of-service and man-in-the-middle attacks while retaining a competitive computation cost.
Other Latest Articles
- A Survey On Symmetric Key Protocol For Spontaneous Wireless Ad Hoc Network Creation
- Are The Rural Baram Communities Aware Of Influenza Pandemic
- Natural Language Processing And Clustering Based Service Discovery
- Assessment Software Program For Use In Polytechnics In Ghana Using MATLAB
- Extraction Of Albumin Of Snakehead Fish Channa Striatus In Producing The Fish Protein Concentrate FPC
Last modified: 2015-06-28 03:54:56